As organizations accelerate cloud adoption, cybersecurity experts are warning that the biggest risks are no longer at the network perimeter but deep within the cloud control plane. Ahead of World Cloud Security Day, leaders from Adactin, ClickHouse, and Fastly highlighted a significant shift in how cyber threats are emerging and evolving.

According to Adactin’s Giri Jayaprakash, modern cyberattacks are increasingly leveraging legitimate access rather than exploiting traditional software vulnerabilities. Attackers are targeting identities, permissions, and automation workflows within the control plane—the central layer that manages cloud environments. This shift makes detection more challenging, as malicious activity often appears as normal user behavior.

Jayaprakash emphasized the growing risk of “identity and permission drift,” particularly as organizations rapidly scale cloud operations. Non-human identities, such as service accounts and automated processes, are being created at a pace that outstrips governance mechanisms. With security reviews often remaining manual and periodic, gaps in oversight are creating systemic vulnerabilities that attackers can exploit.

Meanwhile, Paul Davis from ClickHouse pointed to another growing challenge: the explosion of security telemetry data. Traditional security tools, which rely on batch processing, often force teams to limit data ingestion. This results in the loss of critical, granular insights that could help detect threats early. Davis noted that modern platforms are now evolving to unify logs, metrics, and traces into a single analytical layer, enabling faster and more precise threat detection across massive datasets.

Adding to the concern, Fastly’s Guy Brown highlighted what he described as the “complexity tax” of managing multiple disconnected security tools. He warned that fragmented systems reduce visibility and slow response times, ultimately increasing organizational risk. Brown advocated for consolidating security controls at the network edge, where real-time monitoring and global policy enforcement can be more effectively implemented.

As cloud environments grow more complex, experts agree that organizations must rethink their security strategies. Moving beyond perimeter-based defenses and focusing on identity management, data visibility, and system simplification will be critical to staying ahead of evolving cyber threats.

Recommended Cyber Technology News:

To participate in our interviews, please write to our CyberTech Media Room at info@intentamplify.com 



🔒 Login or Register to continue reading